How to Build a Hybrid Cloud Computing Strategy


Virtual private cloud technology defines the network security boundaries for the business service and the locations (types of deployments) where elements of these services can be placed or moved. These solutions can be enabled by two types of offerings: 1) those that focus on the network security layer; and 2) those that abstract the application tier across cloud deployment boundaries.

The evolution of cloud computing and virtual private cloud technologies add to the ever widening portfolio of infrastructure deployment options that help enterprises match the infrastructure to the needs of the application more efficiently and cost effectively than has been possible before. Here are a few tips to ensure the integration between these deployment infrastructures deliver the greatest value:

1. View cloud platforms as a portfolio of deployment options. Look at creating a portfolio of cloud resources, composed of public, internal, and hosted cloud deployments linked together with traditional deployments via virtual private cloud. Look for ways to optimize-and automate-the deployment and management of your business services where most appropriate based on the application requirements and business/IT policies. You definitely want to learn to walk in cloud environments before going hog wild and spreading services across lots of cloud deployments but, as you gain experience, begin to craft a strategy that streamlines deployment expenses in much the same way that you optimize your Web site deployment. The ultimate goal is to speed IT service delivery while reducing costs.

2. Partner with enterprise architects to get the deployment model right. Your Web infrastructure likely spans your data center, a content delivery network, and a hosting provider-each chosen for what they do best and connected to deliver optimum performance and customer experience. Approach cloud computing in the same way. Work with your enterprise architects to determine what types and portions of applications and what data sets are the best fit with the specific cloud deployment options discussed here and create joint policies to guide appropriate use as new applications are built or readied for the cloud.

3. Build a security model and policy with your CISO. Work with your security and risk management professionals to understand what protections must be taken for what types of data so you can determine where applications can safely be deployed. Create and publish this as a policy for all application development professionals to help guide their use of cloud resources. Also, use this guide to set the SLAs for your private cloud, whether internal or hosted.

Zur Startseite